Proof of Authenticity of Logistics Information with Passive RFID Tags
and Blockchain
- URL: http://arxiv.org/abs/2011.05442v1
- Date: Tue, 10 Nov 2020 22:45:49 GMT
- Title: Proof of Authenticity of Logistics Information with Passive RFID Tags
and Blockchain
- Authors: Hiroshi Watanabe, Kenji Saito, Satoshi Miyazaki, Toshiharu Okada,
Hiroyuki Fukuyama, Tsuneo Kato, Katsuo Taniguchi
- Abstract summary: We propose a design in which a reader atomically writes an evidence to blockchain along with its reading and writing a tag.
By semi-formal modeling, we confirmed that the confidentiality and integrity of the information can be maintained throughout the system.
This makes it possible to trace authentic logistics information using inexpensive passive RFID tags.
- Score: 1.7240671897505613
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In tracing the (robotically automated) logistics of large quantities of
goods, inexpensive passive RFID tags are preferred for cost reasons.
Accordingly, security between such tags and readers have primarily been studied
among many issues of RFID. However, the authenticity of data cannot be
guaranteed if logistics services can give false information. Although the use
of blockchain is often discussed, it is simply a recording system, so there is
a risk that false records may be written to it.
As a solution, we propose a design in which a digitally signing,
location-constrained and tamper-evident reader atomically writes an evidence to
blockchain along with its reading and writing a tag.
By semi-formal modeling, we confirmed that the confidentiality and integrity
of the information can be maintained throughout the system, and digitally
signed data can be verified later despite possible compromise of private keys
or signature algorithms, or expiration of public key certificates. We also
introduce a prototype design to show that our proposal is viable.
This makes it possible to trace authentic logistics information using
inexpensive passive RFID tags. Furthermore, by abstracting the reader/writer as
a sensor/actuator, this model can be extended to IoT in general.
Related papers
- The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications [0.9999629695552193]
This paper presents a review of the most common flaws found in RFID-based IoT systems.
Second, a novel methodology that eases the detection and mitigation of such flaws is presented.
Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it.
arXiv Detail & Related papers (2024-02-05T23:55:46Z) - Towards an autonomous industry 4.0 warehouse: A UAV and blockchain-based
system for inventory and traceability applications in big data-driven supply
chain management [0.0]
We present the design and evaluation of a UAV-based system aimed at automating inventory tasks and keeping the traceability of industrial items attached to RFID tags.
The system uses a blockchain and a distributed ledger to store certain inventory data collected by UAVs, validate them, ensure their trustworthiness and make them available to the interested parties.
arXiv Detail & Related papers (2024-02-01T16:05:15Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - Can AI-Generated Text be Reliably Detected? [54.670136179857344]
Unregulated use of LLMs can potentially lead to malicious consequences such as plagiarism, generating fake news, spamming, etc.
Recent works attempt to tackle this problem either using certain model signatures present in the generated text outputs or by applying watermarking techniques.
In this paper, we show that these detectors are not reliable in practical scenarios.
arXiv Detail & Related papers (2023-03-17T17:53:19Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - The Tags Are Alright: Robust Large-Scale RFID Clone Detection Through
Federated Data-Augmented Radio Fingerprinting [11.03108444237374]
We propose a novel training framework based on federated machine learning (FML) and data augmentation (DAG) to boost the accuracy of RFID clone detection.
To the best of our knowledge, this is the first paper experimentally demonstrating the efficacy of FML and DA on a large device population.
arXiv Detail & Related papers (2021-05-08T10:48:02Z) - Don't Forget to Sign the Gradients! [60.98885980669777]
GradSigns is a novel watermarking framework for deep neural networks (DNNs)
We present GradSigns, a novel watermarking framework for deep neural networks (DNNs)
arXiv Detail & Related papers (2021-03-05T14:24:32Z) - Backpropagating through Fr\'echet Inception Distance [79.81807680370677]
FastFID can efficiently train generative models with FID as a loss function.
Using FID as an additional loss for Generative Adversarial Networks improves their FID.
arXiv Detail & Related papers (2020-09-29T15:04:40Z) - Signing Information in the Quantum Era [0.0]
We review digital signature schemes, looking at their origins and where they are under threat.
We introduce post-quantum digital schemes, which are being developed with the specific intent of mitigating against threats from quantum algorithms.
Finally, we review schemes for signing information carried on quantum channels, which promise provable security metrics.
arXiv Detail & Related papers (2020-09-25T10:44:36Z) - Monitoring Browsing Behavior of Customers in Retail Stores via RFID
Imaging [24.007822566345943]
We propose TagSee, a multi-person imaging system based on monostatic RFID imaging.
We implement TagSee using a Impinj Speedway R420 reader and SMARTRAC DogBone RFID tags.
TagSee can achieve a TPR of more than 90% and a FPR of less than 10% in multi-person scenarios using training data from just 3-4 users.
arXiv Detail & Related papers (2020-07-07T16:36:24Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.